Remove B2B Remove Data privacy Remove Internet Remove Risk
article thumbnail

Best Practices Q&A: The importance of articulating how cybersecurity can be a business enabler

The Last Watchdog

Related: Data privacy vs data security However, this remains a novel concept at most companies. These key capabilities fall under the four competencies of oversight, process risk management, technology risk management, and human risk management. There is also a benefit of stronger business partnerships.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. OneRep provides a consumer service that scrubs your personal information from Google and dozens of privacy-breaching websites.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Access Control: The 5 Single Sign-On Benefits

IT Security Guru

Working from home resulted in additional risk management and security challenges for employees, executive leadership, and information technology (IT) teams. The concept of a static login for all user activities is not enough to address the evolving risk landscape where businesses operate. SSO has several benefits and use cases.

article thumbnail

Spinbackup GDPR Compliance

Spinone

Data is associated with a significance of risk if it’s stolen or abused. GDPR will replace the 1995 EU Data Protection Directive , which was introduced two decades ago when the Internet has not yet revolutionized business communications. What is GDPR? It must be as easy to withdraw consent as it is to give it.

B2B 40
article thumbnail

ROUNDTABLE: What happened in privacy and cybersecurity in 2021 — and what’s coming in 2022

The Last Watchdog

The Solar Winds hack demonstrated supply chain exposures; the attempted poisoning of a Tampa suburb’s water supply highlighted public utilities at risk; and the Colonial Winds ransomware attack signaled cyber extortionist rings continuing to run rampant. New rules create complexity and introduce vulnerabilities and security risks.

article thumbnail

Redesigning the Security Narrative

Duo's Security Blog

Though the security industry typically serves the B2B space, there is increasing nuance in the types of clientele served. With concepts like remote work and data privacy here to stay, the need to provide frictionless, scalable security for every network, user, device and application is more critical than ever.